Cyber Attack

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber AttacksHackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit…

8 months ago
Critical AWS Services Vulnerability Let Attackers Execute Remote CodeCritical AWS Services Vulnerability Let Attackers Execute Remote Code

Critical AWS Services Vulnerability Let Attackers Execute Remote Code

Hackers attack AWS as it hosts a vast number of high-value targets, including sensitive data, business applications, and cloud resources…

8 months ago
Hackers Exploiting WinRAR Flaw To Attacks Windows & Linux(ESXi) MachinesHackers Exploiting WinRAR Flaw To Attacks Windows & Linux(ESXi) Machines

Hackers Exploiting WinRAR Flaw To Attacks Windows & Linux(ESXi) Machines

Head Mare, a hacktivist group targeting Russia and Belarus, leverages phishing campaigns distributing WinRAR archives to exploit CVE-2023-38831 for initial…

8 months ago
North Korean Kimusky Group Attacking University ProfessorsNorth Korean Kimusky Group Attacking University Professors

North Korean Kimusky Group Attacking University Professors

Kimsuky, a North Korean APT group, employs targeted phishing campaigns, leveraging DMARC exploitation to conceal social engineering, infiltrate university networks,…

8 months ago
New APT Actor240524 Weaponizing Official Documents To Deliver MalwareNew APT Actor240524 Weaponizing Official Documents To Deliver Malware

New APT Actor240524 Weaponizing Official Documents To Deliver Malware

A new APT group, dubbed Actor240524, launched a spear-phishing campaign targeting Azerbaijani and Israeli diplomats on July 1, 2024, where…

8 months ago
Chameleon Device-Takeover Malware Attacking IT EmployeesChameleon Device-Takeover Malware Attacking IT Employees

Chameleon Device-Takeover Malware Attacking IT Employees

Researchers have identified a new Chameleon campaign targeting hospitality employees, where the attackers employed a deceptive tactic, disguising malicious software…

8 months ago
North Korean Hackers Exploit VPN Update Flaw To Breach NetworksNorth Korean Hackers Exploit VPN Update Flaw To Breach Networks

North Korean Hackers Exploit VPN Update Flaw To Breach Networks

North Korean state-sponsored hacking groups, including Kimsuky (APT43) and Andariel (APT45), have significantly increased cyberattacks on South Korean construction and…

8 months ago
Panamorfi TCP flood DDoS Attack Targeting Jupyter NotebooksPanamorfi TCP flood DDoS Attack Targeting Jupyter Notebooks

Panamorfi TCP flood DDoS Attack Targeting Jupyter Notebooks

An attacker, identified as Yawixooo, leveraged a publicly accessible Jupyter Notebook honeypot as an initial access vector. The honeypot's exposure…

8 months ago
Hackers Abused StackExchange Platform To Deliuver Malicious Python PackageHackers Abused StackExchange Platform To Deliuver Malicious Python Package

Hackers Abused StackExchange Platform To Deliuver Malicious Python Package

Attackers uploaded malicious Python packages targeting Raydium and Solana users to PyPI, leveraging a StackExchange post to distribute the malware. …

8 months ago
Hackers Hijacked ISP Service Provider To Poison Software UpdatesHackers Hijacked ISP Service Provider To Poison Software Updates

Hackers Hijacked ISP Service Provider To Poison Software Updates

⁤Hackers often attack ISP service providers for several illicit purposes. The most significant ones are disrupting internet services, stealing sensitive…

8 months ago